General

  • Target

    speedtest.sh

  • Size

    9KB

  • Sample

    240523-prdrcsaa59

  • MD5

    9d5e0fadace7bbe33c2b93b2e743ee93

  • SHA1

    e14a453c3963354695e91918cf7d1118f6cdb349

  • SHA256

    5ed7bd7288442a0893fcf8dde1fad7b2e3906824e56856d4b100f52ee6bc5f6d

  • SHA512

    11be846d37c0a3e05bc6e8bf55c5eb056084b424c3d67bb6d85f4fbc4ed653dc264ac2db42c0ff5b85d019de39b204926ea4d39d8fcb080ea93f7a19505769ff

  • SSDEEP

    192:2wQhZGpFcVQQK6QSTUT2mtKvNga0qe51PESpCG7WgMsS:r6QSUTxKBa5ZEACUWgMsS

Score
6/10

Malware Config

Targets

    • Target

      speedtest.sh

    • Size

      9KB

    • MD5

      9d5e0fadace7bbe33c2b93b2e743ee93

    • SHA1

      e14a453c3963354695e91918cf7d1118f6cdb349

    • SHA256

      5ed7bd7288442a0893fcf8dde1fad7b2e3906824e56856d4b100f52ee6bc5f6d

    • SHA512

      11be846d37c0a3e05bc6e8bf55c5eb056084b424c3d67bb6d85f4fbc4ed653dc264ac2db42c0ff5b85d019de39b204926ea4d39d8fcb080ea93f7a19505769ff

    • SSDEEP

      192:2wQhZGpFcVQQK6QSTUT2mtKvNga0qe51PESpCG7WgMsS:r6QSUTxKBa5ZEACUWgMsS

    Score
    6/10
    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks